NSO Phantom – wolf in sheep’s clothing?

Phantom – Partner to Pegasus Spyware

See the whole series part 1 LINK part2 LINK

Israel based NSO Group is a controversial software company that provides advanced cybersecurity solutions to the government and the private sector. The company offers two main products, Pegasus, and Phantom, both of which are designed to provide cybersecurity solutions to its clients. Pegasus and Phantom are both state-of-the-art cyber tools, but they have significant differences in terms of their features, functionality, and target market.

Pegasus is a highly sophisticated malware that is specifically designed to target high-value targets, such as government agencies, military organizations, and corporations. This malware provides intelligence agencies with an array of capabilities to conduct remote surveillance, extract sensitive data, and monitor the activities of their targets. Pegasus is equipped with several advanced features, including the ability to bypass antivirus software, access encrypted communications, and monitor a target’s activities remotely.

First design the spy, then design the spy catcher

Phantom, on the other hand, is a cybersecurity solution designed for enterprise organizations, specifically for corporate networks and government organizations. Phantom provides a comprehensive cybersecurity solution that covers all aspects of cyber protection, including threat intelligence, incident response, and network security. Phantom is designed to provide a full-spectrum solution that allows organizations to detect and respond to cyber threats in real-time. Phantom is equipped with several advanced features, including threat intelligence, real-time monitoring, and incident response capabilities, to provide organizations with the best possible defense against cyber threats.

Pegasus and Phantom differ in terms of their target market. Pegasus is designed for high-value targets, such as government agencies, military organizations, and corporations, while Phantom is designed for enterprise organizations, including corporate networks and government organizations. Pegasus is designed to provide intelligence agencies with the ability to conduct remote surveillance, extract sensitive data, and monitor the activities of their targets, while Phantom is designed to provide organizations with a comprehensive cybersecurity solution that covers all aspects of cyber protection.

Pegasus and Phantom also differ in terms of their deployment method. Pegasus is typically deployed as a malware and is used to infect the target’s device, while Phantom is deployed as a software solution and is installed on the organization’s network. Pegasus is used to collect intelligence and monitor the activities of the target, while Phantom is used to protect the organization’s network from cyber threats.

Pegasus and Phantom also differ in terms of their technical capabilities. Pegasus is designed to bypass antivirus software and access encrypted communications, while Phantom is designed to provide a comprehensive cybersecurity solution that covers all aspects of cyber protection. Pegasus is designed to provide intelligence agencies with the ability to monitor the activities of their targets remotely, while Phantom is designed to provide organizations with the ability to detect and respond to cyber threats in real-time.

NO ONE IS SAFE – DALAI LAMA ATTACK – 2019 INDIA

The NSO Group Phantom penetration of the Dalai Lama’s office was a major cyberattack that occurred in early 2019. The attack was carried out by the Israeli cyber-security firm NSO Group. The attack targeted the office of the Dalai Lama in Dharmsala, India, the spiritual leader of Tibet who does not own a Smart Phone or use a PC or laptop and was designed to gain access to sensitive information about his activities and those of his supporters. The attack began with a malicious link sent to an email address associated with the Dalai Lama’s office. When clicked, this link installed a powerful piece of malware known as Phantom on the target computer. This malware can take complete control over a device, allowing attackers to access all data stored on it and monitor all activity taking place on it. It can also be used to remotely control devices and take screenshots or record audio and video from them. Reports indicated that the software spied in real time, by turning on the camera and microphone in the Dalai Lamas office and conversations were recorded.

Once installed, Phantom allowed attackers to gain access to sensitive documents stored on computers in the Dalai Lama’s office, as well as emails sent between members of his staff. It is believed that this information was then used by NSO Group to target individuals associated with the Tibetan independence movement at the request of the Chinese Government. The attack was discovered by researchers from Citizen Lab at the University of Toronto in April 2019. They were able to trace it back to NSO Group due to its use of unique code signatures that had previously been linked to other attacks attributed to them. This discovery led to widespread condemnation from human rights groups and governments around the world who accused NSO Group of using their technology for unethical purposes.

In response, NSO Group denied any involvement in the attack and claimed that their technology had been misused by an unknown third party without their knowledge or consent. However, they have since come under increased scrutiny for their activities and have been accused of selling their surveillance software to oppressive regimes such as Saudi Arabia and Mexico who have used it for human rights abuses. The incident has highlighted how powerful surveillance technology can be used for malicious purposes if not properly regulated or monitored by governments or corporations who develop it. As such, there is now an increased focus on ensuring that such technology is not misused in future attacks against vulnerable targets such as those associated with political movements or religious organizations like the Dalai Lama’s office.

CONCLUSION

The attack on the Dalai Lamas office was a despicable act and shows just the horrific measures that Governments such as the Chinese will go to seek information.

Pegasus and Phantom are two of NSO Group’s most advanced cybersecurity solutions and threats to democracy, both of which are designed to protection against cyber threats – allegedly. . Pegasus is designed for high-value targets, such as government agencies, military organizations, and corporations, while Phantom is designed for enterprise organizations, including corporate networks and government organizations and the Dalai Lamas office. Pegasus and Phantom differ in terms of their target market, deployment method, and technical capabilities, but both provide organizations with the best possible defense against cyber threats. Both are a continuing threat to individuals and organizations who are under duress.

We will continue to monitor and research this subject of NSO cyberspace and report on our findings.

Keep Reading..~!